CATALANO, Dario
 Distribuzione geografica
Continente #
NA - Nord America 3.135
EU - Europa 1.233
AS - Asia 1.063
SA - Sud America 281
AF - Africa 103
OC - Oceania 11
Continente sconosciuto - Info sul continente non disponibili 3
Totale 5.829
Nazione #
US - Stati Uniti d'America 3.010
SG - Singapore 454
CN - Cina 447
IT - Italia 347
IE - Irlanda 269
BR - Brasile 257
UA - Ucraina 197
CA - Canada 107
RU - Federazione Russa 84
DE - Germania 81
SN - Senegal 65
FI - Finlandia 58
AT - Austria 46
KR - Corea 39
FR - Francia 36
GB - Regno Unito 34
IN - India 26
SE - Svezia 22
CI - Costa d'Avorio 18
AR - Argentina 13
VN - Vietnam 13
BD - Bangladesh 12
MX - Messico 12
CZ - Repubblica Ceca 11
UZ - Uzbekistan 11
AU - Australia 10
HK - Hong Kong 10
IQ - Iraq 9
ES - Italia 8
NL - Olanda 8
TR - Turchia 8
JP - Giappone 7
ZA - Sudafrica 7
CH - Svizzera 5
MA - Marocco 5
SA - Arabia Saudita 5
DK - Danimarca 4
PK - Pakistan 4
DZ - Algeria 3
EU - Europa 3
GR - Grecia 3
LU - Lussemburgo 3
PL - Polonia 3
RO - Romania 3
TW - Taiwan 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
BG - Bulgaria 2
BY - Bielorussia 2
CO - Colombia 2
DO - Repubblica Dominicana 2
EC - Ecuador 2
EG - Egitto 2
HN - Honduras 2
HU - Ungheria 2
JO - Giordania 2
LB - Libano 2
LT - Lituania 2
NG - Nigeria 2
NP - Nepal 2
PE - Perù 2
CL - Cile 1
ID - Indonesia 1
IL - Israele 1
KH - Cambogia 1
LI - Liechtenstein 1
PA - Panama 1
PS - Palestinian Territory 1
PT - Portogallo 1
PW - Palau 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
UY - Uruguay 1
Totale 5.829
Città #
Dallas 674
Santa Clara 616
Chandler 307
Singapore 282
Dublin 269
Jacksonville 199
Boardman 109
Catania 108
Hefei 86
Beijing 78
Nanjing 76
Andover 75
Toronto 75
Cambridge 72
Lawrence 69
Ashburn 67
Dakar 65
Nuremberg 52
Helsinki 48
Milan 43
Columbus 39
Seoul 39
Des Moines 35
Chicago 34
San Mateo 34
The Dalles 33
Council Bluffs 31
Saint Petersburg 27
Wilmington 25
Rome 24
Hebei 22
Jiaxing 20
Nanchang 20
Ottawa 19
Abidjan 18
São Paulo 17
Houston 16
Los Angeles 16
Shenyang 16
Brooklyn 15
Vienna 14
Changsha 13
San Francisco 13
Tianjin 12
New York 10
Jinan 9
Manchester 9
Reggio Calabria 9
Brno 8
Kunming 8
Stockholm 8
Atlanta 7
Brasília 7
Guangzhou 7
London 7
Milazzo 7
Norwalk 7
Pune 7
Civitanova Marche 6
Hong Kong 6
Montreal 6
Moscow 6
Palermo 6
Tokyo 6
Valverde 6
Washington 6
Zhengzhou 6
Belo Horizonte 5
Chennai 5
Dhaka 5
Frankfurt am Main 5
Giardini-Naxos 5
Goiânia 5
Johannesburg 5
Messina 5
Ningbo 5
Paris 5
Ravenna 5
Rio de Janeiro 5
Seattle 5
Shanghai 5
Tashkent 5
Aachen 4
Aci Catena 4
Campinas 4
Castiglione Olona 4
Cesa 4
Curitiba 4
Fremont 4
Hangzhou 4
Lappeenranta 4
Madrid 4
Maletto 4
Melbourne 4
Mexico City 4
Mumbai 4
Munich 4
Niscemi 4
São José dos Campos 4
Bari 3
Totale 4.232
Nome #
Multiparty Computation Method 158
Metodo di multiparty computation 140
Verifiable Pattern Matching on Outsourced Texts 118
Algebraic (trapdoor) one-way functions: Constructions and applications 111
Practical functional encryption for quadratic functions with applications to predicate encryption 111
Fully non-interactive onion routing with forward secrecy 108
A Color Opponency Watermarking Scheme for Digital Images 108
MonZa: Fast Maliciously Secure Two Party Computation on Z_(2^k) 108
Anamorphic Encryption: New Constructions and Homomorphic Realizations 98
A certificateless approach to onion routing 94
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 90
Practical homomorphic MACs for arithmetic circuits 87
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions 87
Zero-Knowledge Sets with Short Proofs 86
Algebraic (Trapdoor) One-Way Functions and Their Applications 86
Coercion-Resistant Electronic Elections 84
A Fair Micro-Payment Scheme for Profit Sharing in a P2P Network 84
Trapdoor Hard-To-Invert Group Isomorphisms and their Applications to Password-based Authentication 83
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications 82
Coercion-Resistant Electronic Elections 81
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 79
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings 79
On the security notions for homomorphic signatures 78
Wildcarded Identity-Based Encryption 77
Homomorphic Signatures with Efficient Verification for Polynomial Functions. 76
Fully Non-interactive Onion Routing with Forward-Secrecy 74
Privacy-Preserving Fingercode Authentication 73
Labeled homomorphic encryption: Scalable and privacy-preserving processing of outsourced data 72
Hybrid Commitments and their Applications to Zero Knowledge Proof Systems 71
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality 71
Searchable Encryption Revisited: Consistency Conditions, Relation to Anonymous IBE, and Extensions 69
Paillier's Trapdoor Functions Hides up to O(N) bits 69
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results 69
Computing inverses over a shared secret modulus 69
Double-authentication-preventing signatures in the standard model 68
Practical Homomorphic Message Authenticators for Arithmetic Circuits 68
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations 68
A P2P Market Place based on Aggregate Signatures 67
Adaptive Pseudofree Groups and Their Applications 66
Constant Round Authenticated Group Key Agreement via Distributed Computation 65
Efficient Distributed Computation Modulo a Shared Secret'' 65
Inner-Product Functional Encryption with Fine-Grained Access Control 65
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures 63
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys 63
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions 63
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011 63
Vector commitments and their applications 63
Off-line/on-line signatures revisited: A general unifying paradigm, efficient threshold variants and experimental results 63
Bandwidth-Efficient Threshold EC-DSA 63
Verifiable Random Functions from Identity based Key Encapsulation 62
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 62
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 61
Robust watermarking for Images Based on Colors Manipulation 61
Verifiable Pattern Matching on Outsourced Texts [2016] 61
An Efficient Algorithm for the Approximate Median Selection Problem 61
New efficient and secure protocols for Verifiable Signature Sharing and other applications 61
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security 60
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework 60
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data 60
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. 60
Certificateless Onion Routing 60
Identity Based Encryption Gone Wild 59
IPAKE: Isomorphisms for Pasword-based Authenticated Key Exchange 59
Zero-Knowledge Sets with Short Proofs 58
Paillier's Cryptosystem Revisited 58
Limits of Black-Box Anamorphic Encryption 56
Hybrid Trapdoor Commitments and their Applications 56
Preface [Security and cryptography for networks] 56
Homomorphic Signatures and Message Authentication Codes. SCN 2014: 514-519 55
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions 55
Learning SAT-k NF formulas from Membership queries 55
New efficient and secure protocols for Verifiable Signature Sharing and other applications 54
Generalizing Homomorphic MACs for Arithmetic Circuits. 53
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness 53
Adaptively Secure Single Secret Leader Election from DDH 52
The Bit Security of Paillier's Encryption Scheme and its Applications 52
Improved On-Line/Off-Line Threshold Signatures 52
The Hardness of Hensel Lifting: the Case of RSA and Discrete Logarithm 51
Efficient Network Coding Signatures in the Standard Model 50
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups 49
Double-authentication-preventing signatures in the standard model 47
Robust watermarking for images based on color manipulation 41
Chainable Functional Commitments for Unbounded-Depth Circuits 40
Efficient and Universally Composable Single Secret Leader Election from Pairings 35
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions 27
Totale 5.955
Categoria #
all - tutte 21.063
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 21.063


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021228 0 0 0 2 121 5 35 1 37 2 17 8
2021/2022544 61 74 0 5 76 0 77 21 43 1 15 171
2022/2023912 71 39 20 72 81 162 1 188 229 8 31 10
2023/2024453 36 42 19 33 16 27 2 21 2 108 61 86
2024/20252.035 17 149 131 62 446 298 89 217 132 157 136 201
2025/20261.152 251 137 703 61 0 0 0 0 0 0 0 0
Totale 5.955